I have received a lot of questions regarding the SEPIO laptop and operating system, which run from "how is this system more secure than any other linux system?" to "what the heck is the SEPIO OS?"

So let me try to answer some of the questions...

First off my mission goals with this system:

To create an easy to use yet extremely secure OS that anyone can easily migrate to from Windows or Mac. The defensive measures of the system should require little to no user intervention in order to keep the system safe from outside attack. The applications should cover all the users basic needs (video, music, editing, email, browsing, messaging, documents, etc) without having to search for extra software. It must have a full suite of security tools such as encryption software, crypto-currency wallets and tools, TOR/I2P/VPN access, peer 2 peer secure messaging.

We use the model of Anonymity + Security = Privacy and personal privacy is a cornerstone of individual liberty.

Now the questions:

1) What makes this more secure than any other linux distribution?

To start with, Linux is open source (no hidden code), which lends itself to security as it is auditable and transparent. Linux also has some powerful security abilities baked into the kernel although they are often not utilized by most distros. I compile my own kernel with Grsecurity and PaX patches. What is Grsecurity? From their website -

"Grsecurity® is an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening that generally require no configuration. It has been actively developed and maintained for the past 15 years.""Only grsecurity provides protection against zero-day and other advanced threats that buys administrators valuable time while vulnerability fixes make their way out to distributions and production testing. This is made possible by our focus on eliminating entire bug classes and exploit vectors, rather than the status-quo elimination of individual vulnerabilities.""Grsecurity has been developed and maintained since 2001, from the very first 2.4 Linux kernel to the latest and greatest 4.x. In addition to tracking the latest stable kernel, we provide stable releases for both the 3.14 and 4.4 kernels with additional security backports.We stay on top of -- and in many cases drive -- the state of the art in security research. While the security teams of Linux distributions react to the latest widespread exploit simply by fixing the associated vulnerability, we quickly work in addition to close down any new exploit vectors, reduce the chance of similar vulnerabilities, and insert additional roadblocks for ancillary techniques that made the exploit possible or reliable.As a result of this extensive approach, it is not uncommon to find in the event of a published exploit, particularly against the kernel, that the exploit's success is prevented by several separate features of grsecurity."

I write custom firewall rules that guard against outside intrusion tactics. I lockdown traditional attack vectors like SSH, Telnet, Ping. I block IPv6 traffic as it can lead to potential VPN leaks.

I employ restrictive sandboxing on any web facing applications as well as many other commonly used apps. This applies another layer of protection if an application becomes compromised by keeping it containerized.

On demand ant-virus scanning is built in as well as rootkit and trojan scanning.

Common exploit avenues such as single-user login, BIOS attacks and bootloader exploits are blocked. Bootloader is password protected and password is stored hashed.

Full disk encryption (including swap)with strong AES-256-XTS as well as secondary encryption of user folders and tertiary encryption available as needed.

Secure delete function (DoD and Gutman standards).

Browser and Email client are extremely hardened against attacks and data leaking.

Approved VPN clients are built in as well as a preconfigured free VPN option.

Non-logging DNSsec DNS servers are enforced as opposed to the standard "google" DNS which log every search you make and store it indefinitely.

Security updates are delivered as soon as they are released from the Debian/Ubuntu/Mint teams.

I could go on, but that covers the primary security differences between SEPIO and something like Ubuntu, Fedora or Suse....not to mention the massive security chasm between SEPIO and Windows/Mac.

2) What is SEPIO OS?

Well, besides what was already answered above, SEPIO is a security focused distro built on top of Linux Mint. It uses a customized version of the Cinnamon desktop environment. It is a pleasant and easy to use desktop with support for just about every type of video and music format, as well as full photo and document support. You can plug in your email accounts and be off and running in no time. You can easily and safely visit all your favorite websites without fear of compromise. You can enjoy your digital life without the spying and intervention of big corporations, hackers and governments gone crazy.3) Can I just get the SEPIO OS and install it on my own laptop?

At present, no. Besides installing the system I have to do a great deal of custom configuration and hardware setup on each build. This would prove a daunting if not frustrating task for even a competent linux enthusiast.

Sunday, November 6, 2016

Due to the fact that it is very difficult for a solitary vehicle to defend itself effectively we will create an SOP that all movements will consist of two vehicles, a lead/primary and a follow/secondary. The primary is tasked with accomplishing the "mission" (picking up a local supporter, etc) while the follow vehicle follows at a safe distance (will vary depending on road/traffic conditions) and provides overwatch.

As an example, lets say that your primary vic (vehicle) is heading down a lightly traveled rural highway with follow vic a quarter mile or so behind. On long straight stretches of highway, follow vic would drift back and increase distance, keeping primary in sight. If the road gets congested or starts winding around, follow would close the distance as needed. The goal here is to keep primary in sight (as well as maintaining comms - we will cover that later) without giving away the fact that you are supporting the primary. You also want to stay within the range capability of your weapon systems (not to mention the operator's expertise level).

Lets say that primary vic is stopped by a local gang's roadblock or perhaps a rouge government agent executes a "pull-over". Follow vic would make comms with primary so as to keep an ear on what was happening and either pull over and prepare to support by fire, or rapidly make approach as the situation dictates. Ideally you would have a minimum of two people in each vehicle. The driver focuses on driving and the passenger/TC deals with operations.

This order of movement can also be reversed with the primary in the rear if you have a high-value person or item inside the primary. The lead vehicle would act as a probe or pointman, keeping the primary vic buffered as needed.

Once primary reaches it's target it will notify home/base (using brevity codes unless you are lucky enough to have secure comms). Follow vehicle will park in overwatch or "satellite" the area, depending on the situation. A third vehicle with your QRF (quick reaction force) would be on standby at your home/base for the duration of the mission. In the event that the primary/follow teams need support or rescue the QRF team would launch. The QRF should have your largest vehicle and should be heavily armed. The QRF may need to fill multiple roles including that of ambulance and should have the necessary medical support equipment on board.

Equipping the Rig

We are assuming that you will have only soft-skin (non-armored) vehicles at your disposal as armored vehicles in the US are a rather expensive affair, both in initial cost and upkeep. With that in mind, remember that lacking armor - speed (or mobility) equals security.

This is a basic list for what we would keep in our rigs while operating in said environment:

You can tailor this to fit your needs, but this will give you the basic necessities to keep the vehicle rolling in a bad situation. All "tactical" items such as magazines and long guns should be out of sight to someone walking around the outside of the vehicle. It goes without saying that tinted windows are a huge plus.

Keep in mind this list is separate from your personal go-bag, which may contain some of these items as well.

Saturday, November 5, 2016

There could shortly come a time when a mundane task such as driving into town to pick up a family member could become a seriously dangerous activity. Some of us are used to this concept as we performed it routinely overseas as part of a military unit or a clandestine services unit.
The military unit will for the most part roll out in a heavy or overt-profile; meaning part of the psychological strategy is visibly projecting force....the "you don't want none of this" approach. This approach may work depending on the METT-TC or environmental/situational reality. As many a soldier has learned, in a warzone, this can make you a rather juicy target. This could also be applied to a domestic "grid-down/WROL/SHTF" scenario. The clandestine operator will generally follow a policy of low-profile (or no-profile), meaning they seek to blend into the local environment as neatly as possible. This is for a couple of reasons, most of which should be obvious but lets examine a few.

Decidedly overt ODA gun truck

1. Unlike a military unit with air assets and support forces, the ClanOps generally have very limited, if any support (usually limited to other members of their homogeneous unit).

2. It is usually imperative to the successful outcome of their operation that they draw little if any attention to themselves.

3. A military vehicle patrol/convoy/truck team can have anywhere from 12 men to company strength, while the ClanOps will generally have 2 to 5 men.

4. Military units will move in armored vehicles whenever possible (almost exclusively anymore), while a low-profile armored vehicle may not be available for the ClanOps or fit within the mission parameters.

Where am I going with all this?

The ClanOps model is a logical model for the aforementioned SHTF scenarios we may face domestically. Most of us are going to be limited in manpower to our family/friends or neighborhood defense team members. We want to avoid drawing attention and avoid getting into pitched battles as much as possible. Where as before we could simply jump in the car and head into town for groceries, in this scenario we will need to start each movement with a plan and movement brief.

Your planning area should include large and small scale maps of your AO (area of operations) and extra maps for extended movements out of area. Ideally your maps would have overlays that indicate the following:

It should also include a radio scanner tuned to all local emergency frequencies, base station units for your particular radio system, cell phones, computers with area webcam feeds/traffic cams and any other comms items you deem necessary.

As part of your pre-movement brief you would draw your primary route, as well as secondary and tertiary routes. You would also label your phase lines or check points as well as your timelines for departure/arrival/return. This gives your backup team/QRF a better idea of where to find you if lines of communication break down.

Monday, October 3, 2016

As many of you know, I have been working on a secure laptop project for the last three years. As all of us increasingly rely on our personal computers for everything from shopping to communication to news and information, it became clear to me that there needed to be a safer option than Windows and Mac, yet still be simple and easy to use. I give you the first version of the SEPIO privacy conscious computer.

Currently I am offering it in 15.6 inch and 13.3 inch versions. The hardware may vary slightly due to availability, but will all be of comparable speed and quality.

Saturday, September 3, 2016

So, I have been busy the last several weeks. Here is what's coming up.....

1. The GroundRod Primer in Central Washington State is a go for 17-18 SEP. This will probably be the last Primer before GroundRod 2 starts up. Email if you want to secure a seat.

2. My secure phone project is done (finally). The VERUS 1 is a privacy conscious phone with state of the art hardware. It sports a 6 inch HD screen, quad-core processor and 3GB of system RAM. The VERUS OS is built on AOSP and CM with anything Google removed from the system. It features a lot of the security tools that the LIBERTAS tablet had, plus some new goodies. I will get full specs and pictures posted shortly.

3. I am wrapping up the secure laptop project right now. The first SEPIO laptop run will feature a high end AMD CPU, 16GB RAM, HD screen and 1TB hard drive. The SEPIO OS is a hardened system based on Linux. It provides maximum physical and web facing security as well as an extensive suite of cryptography tools and secure communication options. Despite all this I have managed to keep the system simple and easy to use for people new to linux based systems. You can watch movies, play music and surf the web via TOR/I2P/VPN on a hardened and sandboxed browser. There is nothing on the market right now that even attempts to come close to this level of security.

****

I am sure everyone has heard by now that the US government is about to turn the control of the internet over to the UN/ global entities. We saw this coming a long time ago which is why I have been pushing so hard on this subject the last couple years. You need to learn and practice these skills while you still have a chance. Make no mistake, they aim to seriously clamp down on internet free speech.

Saturday, July 30, 2016

I have available class dates for the month of August if there are enough interested parties. I have requests for Wyoming, Florida, Oregon and Ohio, but do not have the minimum student requirements as of yet.

Friday, June 17, 2016

Some recent reviews from students on the GroundRod Primer course...****I've been waiting since June 2013, and the initial Edward Snowden revelations of massive unconstitutional surveillance, for this class. I found GroundRod Primer to be an absolutely essential course for American citizens that want to regain privacy in their digital communications. After completing this class, and implementing even some of the recommendations, you will once again be able to express yourself freely via digital comms without the self-censorship that has become increasingly prevalent with the knowledge of illegal government spying. That is a GREAT feeling.

K covered the various types of encryption and the context in which each was most useful. Discussions on the best VPN providers (and why), email providers, passwords and passphrases were very useful. The discussion of crypto-currency was very interesting. K clarified how to best get started with Bitcoin and start using a payment method that cannot be tracked, just like cash in the physical world. Crypto-currency holds much promise in the event of a dollar collapse or bank failure.

The usability of Linux and secure comm tools have dramatically increased since 2014 (kudos to all the open source developers!). K did a great job of walking us through these tools on laptops booted from a USB drive provided for class exercises. The pros and cons of each were discussed so you had a clear idea of the best context in which to use a tool. The class had a good combination of lecture and exercise. While we covered a lot of material I did not feel rushed. This was a class with substance and immediate practical application.

Make the commitment now to attend a GroundRod Primer class in your area. You will not regret it.

OpSec Grandpa

****Ground Rod Primer Part IPhoenix, Arizona June 11 & 12Why you want this class:You are an American citizenYou want to protect your assets and rights.You are a Windows (or Mac) user.You are Linux user but don't use encryptionDon't take the class if you already work for IRS, FBI or NSA, it'll only make you better.K, the instructor uses these methods and tools as a professional. Imagine Richard Petty giving defensive driving classes.The class consists of two eight-hour days, with generous breaks. K takes questions throughout the day. The sessions are conducted in a "lab" format. A concept or topic is presented and software solutions are explained, then students use the software tools. K provides individual coaching to make sure you've grasped the idea. In our class he provided laptops when student's machines stopped working. The instruction is clear, concise but casual. K doesn't talk over you or down to you. You'll get your money's worth.The class is focused on internet use.securing your data storagesecuring email, file transfer and chatkeeping online traffic private and secure (VPNs)anonymous web surfing (TOR and Darknet) and commerce (crypto-currency)The software tools are all Linux-based and available at zero cost. The hard part is knowing which tools to use. K has done the time-consuming work of filtering good from the bad and mediocre. His classroom operating system is pre-loaded and configured on a usb drive, your machine is unchanged. Your outlook will be changed.Good encryption, properly applied works. K shows how good tools make the job easy. Your part is changing habits and incorporating the tools.God bless our work,JS-06

****

I recently took the GroundRod Primer course from Combat Studies Group and enjoyed it immensely. I am an Info Security professional with 20+ years of experience in securing corporate networks. The class covers the basics very well and even a experienced guy like me learned a few new things. The class also does a great job teaching a tough, very technical, subject to folks that may only have basic computer skills. In summary, whether you're a seasoned info sec professional or someone just learning computers, you will enjoy this class and learn how to better your personal security.

Tuesday, June 7, 2016

Brisco strained against his leather collar, seemingly eager to leave the immediate area. Eva's 70 year old fingers snapped back on the disgruntled terrier's leash, but she could certainly understand his unease. Even though the neighborhood “safety checkpoints” had been a part of their daily life for the better part of the year, she never could resolve herself to see them as anything other than a 21st century re-envisioning of cold war east Germany. The pat downs, the scanning and downloading of her cell phone, the x-ray and search of her belongings just to get from one part of town to the other. Of course it was all necessary because of all the “terrorist activity” in the area; or so she was told.

Once inside her apartment, she began what had become a twice a week operation...removing Brisco's ornate leather collar...pulling back the stitching....retrieving the microSD card hidden between the leather laminate and beneath one of the several steel sequins that decorated his collar. She noted the small red sticker attached to the tiny device, indicating that it was a time sensitive message and needed to be passed as soon as possible. She plugged her “special” thumb-drive into her old laptop and turned it on. The system recognized the bootable operating system on the thumb drive and the hardened OS came to life. She entered her passwords and inserted the microSD card. She opened the Truecrypt volume that resided on the micro and observed one file entitled “r6K?q@71”, this meant nothing to her, not that it should have.....while she and several other groups had the monthly passphrase to open the disk itself, the file inside could only be opened by the intended recipient. She typed up her short courier report, which was basically her version of a succinct SALUTE report for the last few days, encrypted it with her PGP key and inserted it into the Truecrypt volume of the micro. She returned the micro to it's furry courier and pulled the thumb-drive from the laptop, causing the computer to scrub it's memory before shutting down.

Eva gathered her things, and with Brisco in tow, headed towards the door, pausing for a moment to look at a picture on the wall. She needed courage right now and looking at the white haired man in the picture that she had shared her life with..... until agents of the regime took him away forever ….refueled her cause and steadied her nerves. Brisco broke her from her thoughts with a muffled woof, as if reminding her of the time sensitive nature of their mission.
As she and her cohort headed to their dog park rendezvous, she let a half smile show.....lives depended on her, she mattered! – perhaps now more than ever...

This serves as an example for the ongoing COMSEC series. More to follow.......

As many of you know, AirVPN is one of my recommended VPN providers. They are currently having an anniversary promotion until June 12 of 25% off any VPN plan. I encourage everyone to check it out AirVPN SALE , they also accept over 15 different crypto-currencies.

And remember...

1) When you connect to purchase a plan, do so via TOR, another VPN or an anonymous computer away from your home internet.2) Pay with Bitcoin (properly mixed) or other crypto-currency. All that security/anonymity is ruined when you pay with your easily tracked Visa/MC/Bank account.3) If they want a contact email address, use a seperate anonymous one that you use for nothing else, or better yet, a throw-away one from Yopmail, Guerrilla Mail, etc.4) Have more than one VPN provider at your disposal.5) And for the love of ******, use a strong 20 character password or passphrase.

Since the GroundRod Phoenix class was scheduled for Memorial day weekend, and at the request of many of the students, we are rescheduling the Phoenix class for June 11-12.

Class fee is $350 ($300 if we go beyond 10 students). You can reserve your seat by making the $100 class deposit on the Store page (options are available if you do not wish to use Paypal, just email me).

Wednesday, May 4, 2016

Libertas secure tablets are now shipping with Avare ADS-B software installed. This allows you to track aircraft in your AO in real time. You just need to plug in a RTL-SDR USB attachment with the included adapter and you are in business.

Current Libertas owners can install the app from the CSG store in Aptoide.

Note* The map function will not work as it relies on Google maps (Libertas blocks all Google framework), however it does provide the data readout which is what matters in this case.

Tuesday, May 3, 2016

*** Class is a go. Host can be reached at Host , or you can email me at CSG to secure your seat. Once you are confirmed I will forward instructions for the class link up. It will be held in the vicinity of the DFW airport.

I have had several inquires into the GroundRod Primer course scheduled for May 14-15, but I have not had anyone step up to host it yet. I need to hear from the prospective students this week if this is going to happen. If we cannot hit the 10 student minimum, I am willing to do a 6 student minimum at $350 a head (the price will return to $300 if we hit the 10 student minimum).

I will be deploying again soon, so time is running out to make these courses happen. Email me here CSG to reserve a seat or to offer to host.

Saturday, April 30, 2016

The host of the recent PA GroundRod course, IDPA Grandmaster Jack Weigand of Weigand Combat Handguns Inc, was kind enough to send in a review for me to share with the readers...***GroundRod Primer Course Review

Please understand this review is being written by a non computer guy. I
see computers as a tool and the less complicated the better. I need to
be spoon fed information and repetition is required. In this class I got
what I needed.

It is a two day course of non stop input, not rushed but ongoing. K did
a great job in not let anyone get behind. He patiently answered
questions and jumped in and helped when necessary. There was the full
spectrum of students from casual computer user to some fairly high speed
dudes in the class. I can safely say no one was bored.

The course started out with an explanation of what the threats are,
defensive measures and physical counter measures. It was nice to have
all of that in a nutshell. It was an eye opener to me, I knew some of
the threats but not all of the threats we were introduced to.

A great explanation of what operating system to use and why. This was
worth the price of admission. As a non techie guy, Linux was a known
entity but I didn't know much about it. I am now in the process of
changing over to it.

A fantastic explanation of open source software proceeded, I finally
understand why that it is so important to use open source products.

Then we proceeded into various pieces of software. Each was explained in
detail, what it did, why we needed it and how to use it. Disc
overwriting software, encryption software, Keyfiles, passwords and keys,
wireless security, Internet protocols and such. We delved into VPN
(virtual personal networks) which was of great interest to me. I am
already running one. We went over the “Dark Net” and that could have
been a day long study on its own. Tor was a good deal of time in the
class and for good reason. Meta data was a interesting study and how it
is used against you. Web browsers were discussed the pros and cons of
many of the popular offerings.

Email was of course a popular topic and the inherent risks of using
that. Encrypted chat was discussed, setup and used. Constructing,
managing and storing passwords and the software to do all of that was
setup and used. Steganography was discussed and demonstrated, awesome
field of study.

We ran Tails and rummaged through a lot of modification, setup and
running that. I have that running since the class.

Last but not least, Bitcoin was discussed and demonstrated in great
detail. I was completely enthralled with that topic and am starting to
use that also.

All in all you are given a fantastic overview and taste for computer
security and how to establish pretty secure communications using your
computer. I believe I have 20 pages of notes and suggestions for study
in my notebook for further implementation and use.

If you are not sure the course is worth the time and money it will
consume I believe I can say from my vantage point it was worth that and
much more. I told K to sign me up for the followup course to this one.
Hopefully I will have this one digested by then.

Okay, we have a host and I have penciled in Atlanta for 4-5 June. Host for this event can be reached at, TangoIndia-01@protonmail.ch . Reserve your seat via the host and as we get closer I will send out Paypal links. If you don't want to do paypal, let me know and we will work out other arrangements. Also, I still give discounts for Bitcoin payment.******

I have had several requests for Texas and Arizona as well.

For Texas, lets aim for 14-15 May in the Dallas/FW area. I just need one of you to volunteer to host.******

For Arizona, 21-22 May in Phoenix or Tucson area. Again, just need a host.

For those that host, you get a "free' seat to apply to yourself or a friend in need.

Saturday, April 16, 2016

If you are in or near one of these areas and wish to attend an upcoming class, let me know and we will make it happen. The host in each area needs to hit a minimum student threshold before I can commit, so drop a line and let's take back our privacy.

Thursday, April 7, 2016

The interest in the GroundRod course has been overwhelming. I have received many inquiries as to when I would be offering the classes in "this state or that state"....Folks, I am willing to travel to nearly anywhere to do the course. All I need is:

GroundRod Primer is designed to address the fundamental concerns of journalists, concerned citizens, activists, whistle blowers, missionaries and liberty lovers in general, with regard to digital security. Whether hackers, governments, criminals or acts of espionage; our privacy is in serious jeopardy.

You will learn to secure your devices and communications in the following ways:

Properly employ symmetric and asymmetric encryption
Create and safely store powerful passwords
Guard against common criminal and state level intrusion techniques
Recognize unsafe software you are using now and explore safe replacements
Surf the web anonymously
Explore the deep web
Transfer files safely
Communicate securely and privately
Understand and deal with malicious firmware

GroundRod Primer is meant to take the uncertainty and guesswork out of digital security, give you a fundamental base of knowledge to grow from and get you up and running with the highest levels of security available TODAY.

Follow on courses will delve deeper into these subjects and address escape and evasion techniques and other tradecraft.

We had a successful GroundRod Primer course with the Whiterose folks last week and are looking forward to the follow-on classes with them.

One thing that has remained consistent for me over the years, whether teaching CQB, shooting or technical subjects, is the incredible quality of students I see coming through the classes. I see people that are taking ownership of their lives and seeking to better themselves in a world that is struggling to stay free. It is always personally humbling and challenges me to always be improving and deliver the best content I can.

Next class will be held in the Spokane, WA area. Email me or the host at seabeeprepared@gmail.com
if you want to reserve a seat.

Tuesday, March 15, 2016

I had the privilege of attending Sam Culper's SHTF Intelligence course this last weekend in the Pacific Northwest and just wanted to take a moment to thank Sam for a very solid course and make a couple of observations.

People always ask me what they can be doing at this point in the game. I always respond with "training", and not just firearms and tactics training. The understanding and implementation of real-world intelligence skills is arguably every bit as important as the "hard skills" and probably more so for a large segment of the community; in other words, everyone can be playing a part in the "Great Game" (as Kipling put it), but not everyone can be running and gunning, so to speak.

As someone who spent a large portion of their military career engaged in reconnaissance and the "collecting" aspect of intelligence, it was good to spend some time in the S2 (Intel shop) shoes. There is a lot that goes into creating actionable intelligence and Sam's course does an excellent job in covering the necessary skills in a short amount of time.

I would encourage everyone to make the time to attend his course. It will be time well spent.

Monday, February 22, 2016

"Over and over again as people keep talking about the Apple / FBI
encryption stuff, I keep seeing the same line pop up. It's something
along the lines of "but the FBI needs to know what's on that phone, so if Apple can help, why shouldn't it." Let's debunk that myth. The FBI absolutely does not need to know what's on that phone. It might not even care very much about what's on that phone. As the Grugq ably explained last week,
there's almost certainly nothing of interest on the phone. As he notes,
Farook destroyed his and his wife's personal phones, indicating that if
there were anything truly important, he would have destroyed the last
phone too. Also:

FBI already has a massive amounts of data, all of which indicates that
Farook and Malik were not in contact with a foreign terrorist
organisation, nor were they in contact with any other unknown
terrorists.

Even if, despite all evidence to the contrary, Farook and Malik were
somehow in invisible traceless contact with an ISIS handler, that
handler would not have revealed information about other cells, because
that would violate the most basic tenet of security — need to know."

" Honestly, the only reason that the FBI wants to force Apple to create the special operating system for this particular phone is the precedent
that it can go to court and force a company to build special hacking
tools to remove security features from customers. That's a big deal. The
information on the phone is almost certainly not a big deal at all."

Folks, as many insiders and whistle-blowers have pointed out in recent years -properly implemented encryption works. Not using it is a sheer act of foolishness at this point.
I get sick of hearing the oft parroted, "the powers that be can break any encryption and nothing is safe". Well, guess we better hang it up then kids, game over. This point of view is nothing more than IPB (intelligence prep of battlefield) in my opinion; get everyone to throw their arms in the air and acquiesce to just operating in the clear all the time. And just like that, they win.
It is true that there are "broken" encryption standards out there. It's also true that no such agency paid a cool $10 million to RSA Inc to weaken their random number generator a number of years ago (this only affected a specific protocol).
Learn which encryption works and which doesn't. The information is out there.

The feds are leading the charge to sway public opinion into believing that everything should be "backdoored", for public safety and patriotic duty of course. The number one computer operating system in the world is backdoored already (and has been for some time) and evidence suggests that there are serious holes in number two's OS as well (whether intentional or not remains to be seen). There are solutions to these issues if you are not afraid to roll up your sleeves and get your brain dirty. It's really not all that hard.

I will be teaching a clinic on the above in March in Washington state, you can go to Groundrod Class
for the details.

....meatspace is great, just not always an option...

***

"The real danger is the gradual erosion of individual liberties through automation, integration, and interconnection of many small, separate record-keeping systems, each of which alone may seem innocuous, even benevolent, and wholly justifiable." -Anon., U. S. Privacy Study Commission, 1977

And from the late Justice Scalia...

"There is nothing new in the realization that the Constitution sometimes insulates the criminality of a few in order to protect the privacy of us all."Antonin Scalia

Friday, February 12, 2016

* New batch of updated Libertas Tablets are coming online now.* Calendar for upcoming courses has been updated. * Have some new course material coming....stuff you will not find available anywhere else.

* Will be migrating away from Blogger platform soon.

* Customized kydex gear coming soon.

* Hardened phone project (VERUS) is nearing completion.

* Hardened laptops (SEPIO) are being finalized right now...hope to have them at the upcoming class in March.

Wednesday, January 27, 2016

....meanwhile the mainstream agitprop channels are working overtime to fashion an "administration approved" narrative. Don't take anything at face value and always consider the source, not to mention their motivations.

Libertas ad omne audendum

Quotes...

About Me

Combat Veteran, Owner/Instructor CSG Inc, Overseas Government Contractor, Wilderness Medic.
It has been my privilege to have trained literally thousands of personnel from all four branches of the military, special operations forces, federal agencies, police and responsible citizens, in firearms, tactics, survival and trade-craft.